Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review
Abstract
The internet made an individual’s life very easy and more productive, but there are some associated threats linked to the internet and devices. Malware is considered the most severe threat for decades to the digital world and malware variants identification and classification is the most vital and critical research problem. It is an invasive malicious code that accesses devices, information, and services without the permission, knowledge of the user. Researchers, analysts and antivirus companies are incessantly inventing and implementing new strategies to fight back malware and its variants. In the last decade, one of the strategies is extensively used in the field of malware detection and classification is the deep learning methods using malware visualization. Results revealed that using visualization; malware can be identified, classified more promptly, efficiently, and accurately. Deep learning algorithms vary according to applications, architecture, and uses, so it is required to review and inspect the work based on deep learning to use malware visualization to know the recent approaches and innovations that have been established, to identify problems, current issues, challenges, and of course at the same time to motivate potential research directions. In this effort, an extensive survey of works that utilized deep learning methods using malware image representation, for malware classification is reviewed with a detailed discussion on key methods such as data sets description, malware image representation strategies, and deep learning architectures of parameters, contributions, and limitations. A comparison of the reviewed work is presented based on various key factors.
Keywords
References
- Malware statistics and Trends Report [online] by AV-test insti- tute, ”https://www.av-test.org/en/statistics/malware/”.
- McAfee Labs Threats Report [online] November 2020, ”https://www.mcafee.com/enterprise/en-us/assets/reports/rp- quarterly-threats-nov-2020.pdf”.
- L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, ”Malware images: visualization and automatic classification,” In Proceedings of the 8th International Symposium on Vi- sualization for Cyber Security (VizSec ’11), Association for Computing Machinery, New York, NY, USA, Article 4, pp. 17, 2011. DOI:https://doi.org/10.1145/2016904.2016908.
- L. Nataraj, V. Yegneswaran, P. Porras, and J. Zhang, ”A compar- ative assessment of malware classification using binary texture analysis and dynamic analysis,” In Proceedings of the 4th ACM workshop on Security and artificial intelligence (AISec ’11), Association for Computing Machinery, New York, NY, USA, pp. 2130, 2011. DOI:https://doi.org/10.1145/2046684.2046689.
- K. Han, J. H. Lim, and E. G. Im, ”Malware analysis method using visualization of binary files,” In Proceedings of the 2013 Research in Adaptive and Convergent Systems (RACS ’13), As- sociation for Computing Machinery, New York, NY, USA, pp. 317321, 2013. DOI:https://doi.org/10.1145/2513228.2513294.
- A. Makandar and A. Patrot, ”Malware analysis and classifi- cation using Artificial Neural Network,” International Confer- ence on Trends in Automation, Communications and Com- puting Technology (I-TACT-15), Bangalore, pp. 1-6, 2015. DOI:https://doi.org/10.1109/ITACT.2015.7492653.
- K. K. Pal and K. S. Sudeep, ”Preprocessing for image classifica- tion by convolutional neural networks,” IEEE International Con- ference on Recent Trends in Electronics, Information & Com- munication Technology (RTEICT), Bangalore, pp. 1778-1781, 2016. DOI:https://doi.org/10.1109/RTEICT.2016.7808140.
- M. Kalash, M. Rochan, N. Mohammed, N. D. B. Bruce, Y. Wang and F. Iqbal, ”Malware Classification with Deep Convo- lutional Neural Networks,” 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, pp. 1-5, 2018. DOI:https://doi.org/10.1109/NTMS.2018.8328749.
Details
Primary Language
English
Subjects
-
Journal Section
-
Publication Date
December 1, 2020
Submission Date
-
Acceptance Date
-
Published in Issue
Year 2020 Volume: 9 Number: 4
APA
Yadav, B., & Tokekar, S. (2020). Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review. International Journal of Information Security Science, 9(4), 230-247. https://izlik.org/JA53FR94MX
AMA
1.Yadav B, Tokekar S. Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review. IJISS. 2020;9(4):230-247. https://izlik.org/JA53FR94MX
Chicago
Yadav, Balram, and Sanjiv Tokekar. 2020. “Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review”. International Journal of Information Security Science 9 (4): 230-47. https://izlik.org/JA53FR94MX.
EndNote
Yadav B, Tokekar S (December 1, 2020) Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review. International Journal of Information Security Science 9 4 230–247.
IEEE
[1]B. Yadav and S. Tokekar, “Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review”, IJISS, vol. 9, no. 4, pp. 230–247, Dec. 2020, [Online]. Available: https://izlik.org/JA53FR94MX
ISNAD
Yadav, Balram - Tokekar, Sanjiv. “Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review”. International Journal of Information Security Science 9/4 (December 1, 2020): 230-247. https://izlik.org/JA53FR94MX.
JAMA
1.Yadav B, Tokekar S. Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review. IJISS. 2020;9:230–247.
MLA
Yadav, Balram, and Sanjiv Tokekar. “Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review”. International Journal of Information Security Science, vol. 9, no. 4, Dec. 2020, pp. 230-47, https://izlik.org/JA53FR94MX.
Vancouver
1.Balram Yadav, Sanjiv Tokekar. Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification : A Review. IJISS [Internet]. 2020 Dec. 1;9(4):230-47. Available from: https://izlik.org/JA53FR94MX